Risk
10/11/2012
11:06 AM
Connect Directly
RSS
E-Mail
50%
50%

Mozilla Suspends Firefox 16 Downloads: Serious Bug

Mozilla warns that Firefox 16 contains significant vulnerability, plans to offer patched version for download as soon as possible.

Just one day after releasing Firefox 16, Mozilla Wednesday suspended downloads of the new software after it discovered a security vulnerability in the browser.

In a security warning, Firefox director of security assurance Michael Coates, said that "the vulnerability could allow a malicious site to potentially determine which websites users have visited and have access to the URL or URL parameters." But he said that Mozilla had seen no evidence that the bug was being exploited by in-the-wild attacks.

Even so, "Firefox 16 has been temporarily removed from the current installer page and users will automatically be upgraded to the new version as soon as it becomes available," said Coates. Furthermore, he noted that "as a precaution, users can downgrade to version 15.0.1," though he said that any current version 16 installations would be automatically updated after the patch gets issued.

Mozilla plans to issue a patched version of Firefox 16 Thursday.

[ Security threats are growing. Read Web API Allows Phishing Attack. ]

In the interim, however, is downgrading to Firefox 15.1 wise? According to vulnerability information provider Secunia, Firefox 15.x contains numerous "highly critical" vulnerabilities that could allow an attacker to remotely bypass the browser's security controls, execute a cross-site scripting attack, spoof websites, crash the browser, or access a user's system. All told, it said there are 23 issues, which remain--as yet--unpatched in version 15, though Mozilla reported fixing 14 known vulnerabilities in version 16.

According to market watcher Net Applications, as of September 2012, Firefox controlled 20% of the desktop browser market, putting it behind Internet Explorer (54%), but ahead of other rivals, including Chrome (19%), Safari (5%), and Opera (2%).

In other security-related browser news, the Electronic Frontier Foundation (EFF) Monday, together with the Tor Project, announced the release of HTTPS Everywhere version 3.

The privacy tool, which is a browser add-on, forces an encrypted HTTPS connection on any website that offers users a choice between HTTP and HTTPS. "Many sites on the Web offer some limited support for encryption over HTTPS, but make it difficult to use," according to the HTTPS Everywhere download page. "For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using a clever technology to rewrite requests to these sites to HTTPS."

Despite the branding, however, the tool won't work everywhere, although it does now work with 1,500 sites--or about twice as many as with the previous version--and gets used by about 2.5 million people. "Our current estimate is that HTTPS Everywhere 3 should encrypt at least a hundred billion page views in the next year, and trillions of individual HTTP requests," said EFF technology projects director Peter Eckersley in a blog post.

So far, stable versions of HTTPS Everywhere have only been available for Firefox. But the EFF and Tor, together with a group of volunteers, are developing a version for Chrome and Chromium, though it's not yet ready for public release.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
10/12/2012 | 10:28:29 AM
re: Mozilla Suspends Firefox 16 Downloads: Serious Bug
UPDATE
Mozilla pushed an update for Firefox (16.0.1) at 3pm ET Thursday. This Mozilla security bulletin has more details.
Verdumont Monte
50%
50%
Verdumont Monte,
User Rank: Apprentice
10/11/2012 | 8:28:51 PM
re: Mozilla Suspends Firefox 16 Downloads: Serious Bug
This bug has been fixed already. Please post an update to the article..
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.